Presentation by Jon Longstaff at Grid Analytics Europe 2016: Cyber-Secure Analytics – identifying and overcoming the security vulnerabilities of next generation grid analytics infrastructures that integrate multiple systems and data sources.
Grid Analytics Europe 2016: "Open for Business", April 2016OMNETRIC
Presentation by Franz Winterauer at Grid Analytics Europe 2016 for the Analytics Technology Innovation Panel – learning from the application of advanced and open-source analytics technologies and tools in the large-scale implementation of utility grid analytics programmes.
2016 IDC Pan-European Utilities Summit: Open for BusinessOMNETRIC
The OMNETRIC Group's CEO, Maikel van Verseveld presented at the IDC Pan-European Utilities Summit 2016 in Italy. There he introduced attendees to the concept of, “Open for Business.” For the utility sector these days, that refers to open platforms, open ecosystems, open architectures, and of course, open-minds. After all, a lot is changing - and quickly – in the business of powering the planet.
DistribuTECH 2016: OMNETRIC next generation outage managementOMNETRIC
The OMNETRIC Group joined Accenture Utilities at DistribuTECH 2016 in Orlando to give demonstrations to attendees on our next generation outage management solutions.
Grid Analytics Europe 2016: "Open for Business", April 2016OMNETRIC
Presentation by Franz Winterauer at Grid Analytics Europe 2016 for the Analytics Technology Innovation Panel – learning from the application of advanced and open-source analytics technologies and tools in the large-scale implementation of utility grid analytics programmes.
2016 IDC Pan-European Utilities Summit: Open for BusinessOMNETRIC
The OMNETRIC Group's CEO, Maikel van Verseveld presented at the IDC Pan-European Utilities Summit 2016 in Italy. There he introduced attendees to the concept of, “Open for Business.” For the utility sector these days, that refers to open platforms, open ecosystems, open architectures, and of course, open-minds. After all, a lot is changing - and quickly – in the business of powering the planet.
DistribuTECH 2016: OMNETRIC next generation outage managementOMNETRIC
The OMNETRIC Group joined Accenture Utilities at DistribuTECH 2016 in Orlando to give demonstrations to attendees on our next generation outage management solutions.
APDC Transports Executive Breakfast:
Key-note Speaker - Mike Greenan, Rail and Transport Infrastructure Director da ALTRAN
"Transports: Trends and Challenges - Opportunity for Innovation"
An introduction to data centers, including a discussion on location criteria, key factors to look for when thinking about establishing a data center in an existing building and case studies on data centers in the Atlanta and Toronto areas.
This is a concise overview of cellular technology in IoT today. The presentation focuses on cellular communications in IoT and was delivered by Josh Pederson at a speaking session of the Cloud Expo 2018 conference in New York, NY. The presentation discusses the history of cellular in IoT and the arrival of low power wide area (LPWA) cellular communications of LTE-M and NB-IoT. In addition various consumer and commercial use cases for LPWAN cellular devices are provided.
Want to watch the video of this talk & hear about free speaker hangouts?
Hop over here: http://bit.ly/IoTForum16Talks We will keep you up to date with new talks. We will never sell your email address and you can unsubscribe at any time.
Dan Clarke IoT Forum 2016 - We need aspirins, not vitamins to fund smart cities
AI and Machine Learning for Connected Product SupportJosh Pederson
In this presentation delivered at the NEMA Conference in June 2018, we touch on the application of advanced data analytics (machine learning ML and artificial intelligence AI) to reduce support costs and downtime of commercial equipment in the IoT. Through a real-world use case we illustrate the various steps to build toward true predictive maintenance of equipment and highlight the strong opportunity for business value / ROI in the IoT.
Driving Digital Transformation in the IoT EraJosh Pederson
This is a concise presentation on business transformation through IoT delivered at the Smart Home Summit in Burlingame, CA in November 2018. The presentation touches on how and why the data from connected IoT devices can be incredibly valuable to the business and drive digital transformation in the enterprise.
Comprised of five integrated solutions and underpinned by leading technology, Accenture's INTIENT Patient Platform helps life sciences companies better support patients from clinical trials through ongoing treatment and wellness. Visit https://accntu.re/2VWigzh to learn more.
The Machine Integrator Partner Program is a global Schneider Electric program created to develop partnerships with Machine Integrators. Its purpose is to create a win-win environment that increases sales and support.
BigDataStack Connected Consumer Pilot Demo
BigDataStack will provide retailers with optimal insights into consumer preferences and increase the effectiveness of marketing strategies to improve the consumer shopping experience. Led by Worldline, a roadmap for a major Spanish food retailer has been defined, allowing them to offer predictive shopping lists, and tailored recommendations and promotions, improving consumers’ experiences.
Webinar takeaways
The Connected Consumer use case utilizes the BigDataStack environment to implement and offer a recommender system for the grocery market.
All of the data that are used to train the analytic algorithms of the use case are corporate data provided by one of the top food retailers companies in Spain.
My slides for the Innovate UK e-Infrastructure SIG meeting in August 2014, introducing the work we have been doing with HPC Midlands to create a standard heads of agreement for HPC services, to make it easier for academic supercomputer centres to share their facilities with other institutions and with industry.
APDC Transports Executive Breakfast:
Key-note Speaker - Mike Greenan, Rail and Transport Infrastructure Director da ALTRAN
"Transports: Trends and Challenges - Opportunity for Innovation"
An introduction to data centers, including a discussion on location criteria, key factors to look for when thinking about establishing a data center in an existing building and case studies on data centers in the Atlanta and Toronto areas.
This is a concise overview of cellular technology in IoT today. The presentation focuses on cellular communications in IoT and was delivered by Josh Pederson at a speaking session of the Cloud Expo 2018 conference in New York, NY. The presentation discusses the history of cellular in IoT and the arrival of low power wide area (LPWA) cellular communications of LTE-M and NB-IoT. In addition various consumer and commercial use cases for LPWAN cellular devices are provided.
Want to watch the video of this talk & hear about free speaker hangouts?
Hop over here: http://bit.ly/IoTForum16Talks We will keep you up to date with new talks. We will never sell your email address and you can unsubscribe at any time.
Dan Clarke IoT Forum 2016 - We need aspirins, not vitamins to fund smart cities
AI and Machine Learning for Connected Product SupportJosh Pederson
In this presentation delivered at the NEMA Conference in June 2018, we touch on the application of advanced data analytics (machine learning ML and artificial intelligence AI) to reduce support costs and downtime of commercial equipment in the IoT. Through a real-world use case we illustrate the various steps to build toward true predictive maintenance of equipment and highlight the strong opportunity for business value / ROI in the IoT.
Driving Digital Transformation in the IoT EraJosh Pederson
This is a concise presentation on business transformation through IoT delivered at the Smart Home Summit in Burlingame, CA in November 2018. The presentation touches on how and why the data from connected IoT devices can be incredibly valuable to the business and drive digital transformation in the enterprise.
Comprised of five integrated solutions and underpinned by leading technology, Accenture's INTIENT Patient Platform helps life sciences companies better support patients from clinical trials through ongoing treatment and wellness. Visit https://accntu.re/2VWigzh to learn more.
The Machine Integrator Partner Program is a global Schneider Electric program created to develop partnerships with Machine Integrators. Its purpose is to create a win-win environment that increases sales and support.
BigDataStack Connected Consumer Pilot Demo
BigDataStack will provide retailers with optimal insights into consumer preferences and increase the effectiveness of marketing strategies to improve the consumer shopping experience. Led by Worldline, a roadmap for a major Spanish food retailer has been defined, allowing them to offer predictive shopping lists, and tailored recommendations and promotions, improving consumers’ experiences.
Webinar takeaways
The Connected Consumer use case utilizes the BigDataStack environment to implement and offer a recommender system for the grocery market.
All of the data that are used to train the analytic algorithms of the use case are corporate data provided by one of the top food retailers companies in Spain.
My slides for the Innovate UK e-Infrastructure SIG meeting in August 2014, introducing the work we have been doing with HPC Midlands to create a standard heads of agreement for HPC services, to make it easier for academic supercomputer centres to share their facilities with other institutions and with industry.
An in-depth look at:
1. Disruptive Technology and its impact on organizations.
2. Need for a Security Operations Center (SOC) for the 21st century businesses
3. Designing and operating an effective SOC - what it takes to run a successful SOC starting from how we should prepare our minds in terms of approach to the actual implementation and operation.
4. Qualities any SOC Analyst should possess
5. Measuring the success of a SOC - We discuss critical factors to consider when determining the success of a SOC.
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
The Unisys Stealth suite of solutions uses identification, authentication, and encryption to provide security for endpoints, remote users, data centers, and data. The unique design of the solution enables Unisys to create undetectable authenticated user groups that appear invisible to the normal network, allowing critical information to be delivered in a secure network and enabling Unisys to effectively isolate, encrypt, and cloak networks. With its strong overall performance and demonstration of helping clients reduce risk, while also reducing complexity and cost, Unisys has earned Frost & Sullivan’s 2015 New Product Innovation Award.
Do you know the internal signs of a compromise? This deck takes you through the process our Mandiant services teams go through to help discover if an organization has been compromised. You can also view the full webinar here: https://www.brighttalk.com/webcast/10703/187133?utm_source=SS
Microservices: The Future-Proof Framework for IoTCapgemini
Dr Michael Capone Principal Analyst - Capgemini
The data generated by IoT-enabled machines, vehicles and devices can provide companies with insight into user behaviour that they can use to create a personal connection with their customers. Companies are, therefore, scrambling to implement IoT systems in order to generate, capture, protect, and analyse this valuable data. But the insights created are only valuable when they trigger consequent decisions and timely actions. There are many potential users of IoT data such as marketing, sales, held service, product
development, customer support, operations, and supply chain not to mention external users like vendors and partners. Each user group needs to be able to access and select different data and apply different logic and analytic approaches to perform specific tasks.
Furthermore, each group can have unique usability requirements. As companies become more IoT mature and start to plan for “data actionability,” the disadvantages of a homogenous IoT stack or departmental systems become obvious. The best option from a data quality, user acceptance, and ROI perspective is a microservices IoT platform.
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
The next wave of Industrial Internet applications will connect machines and devices together into functioning, intelligent systems with capabilities beyond anything possible today. These systems fundamentally depend on connectivity and information exchange to derive knowledge and make "smart decisions". They require a much higher level of reliability and security than "Consumer" IoT applications. OMG's Data-Distribution Service for Real-Time Systems (DDS) is the premier open middleware standard directly addressing publish-subscribe communications for Industrial IoT applications. It provides a protocol that meets the demanding security, scalability, performance, and Quality of Service requirements of IIoT applications spanning connected machines, enterprise systems, and mobile devices.This presentation will use concrete use cases to introduce DDS and examine why energy, advanced medical, asset-tracking, transportation, and military systems choose to base their designs on DDS.
Presentation at the 2016 IIOT Challenges and Opportunities Workshop.
The next wave of Industrial Internet applications will connect machines and devices together into functioning, intelligent systems with capabilities beyond anything possible today. These systems fundamentally depend on connectivity and information exchange to derive knowledge and make "smart decisions". They require a much higher level of reliability and security than "Consumer" IoT applications. OMG's Data-Distribution Service for Real-Time Systems (DDS) is the premier open middleware standard directly addressing publish-subscribe communications for Industrial IoT applications. It provides a protocol that meets the demanding security, scalability, performance, and Quality of Service requirements of IIoT applications spanning connected machines, enterprise systems, and mobile devices.This presentation will use concrete use cases to introduce DDS and examine why energy, advanced medical, asset-tracking, transportation, and military systems choose to base their designs on DDS.
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
Similar to Grid Analytics Europe 2016: "Defend the Grid", April 2016 (20)
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfGetInData
Recently we have observed the rise of open-source Large Language Models (LLMs) that are community-driven or developed by the AI market leaders, such as Meta (Llama3), Databricks (DBRX) and Snowflake (Arctic). On the other hand, there is a growth in interest in specialized, carefully fine-tuned yet relatively small models that can efficiently assist programmers in day-to-day tasks. Finally, Retrieval-Augmented Generation (RAG) architectures have gained a lot of traction as the preferred approach for LLMs context and prompt augmentation for building conversational SQL data copilots, code copilots and chatbots.
In this presentation, we will show how we built upon these three concepts a robust Data Copilot that can help to democratize access to company data assets and boost performance of everyone working with data platforms.
Why do we need yet another (open-source ) Copilot?
How can we build one?
Architecture and evaluation
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
...dedicated to helping utilities bridge the gap between operations and information technology
...existing as a separate entity to which both Siemens and Accenture could bring their IP and integrate IT and OT more effectively
...with expert practitioners from both companies, working as one team
Talk about each – reference analytics
Challenge
Integrating diverse renewable energy sources, like in Hawaii or in California
Declining prices on some energy markets require flexibility in offering the portfolio via different trading channels
Be prepared for high volume of flexible loads to participate in reserve markets
Solution
A virtual power plant management system will be implemented in order to monitor and control – in case of RWE - up to 50.000 distributed assets
VPP
- Lots of data - consumption, control, forecasts, market, commercial
- not "traditional" grid operations - which is value of case study as it challenges many of the usual concepts - forget the air gap
- Real - we are working on these projects today across Europe
Analytics – two main challenges
chain of trust from the source of the data to the analytics system
Protection of the data in the analytics system
Wouldn’t it be great if there was a shiny piece of IT we could simply slot into the data centre that would solve all of our problems. Mitigate all of those risks, patch those vulnerabilities?
Unfortunately no – it is hard work, incremental improvement. Much like everything else we do.
NIST framework is great to structure the discussion
Not a complete methodology – we rely more on ISA-62443 to undperpin our approach
Analytics focus
Chain of trust
Combination of different data streams – better insight but may be greater risks (customer number / name / demographics)
Who is allowed to access data
valuable to you – valuable to a competitor – valuable to a criminal
Training
JV
Phishing
At rest
Very large datasets with high access rates -> encryption may not be the best approach so what are other strategies
Don’t forget backups
Who do you tell?
NIS will “require operators of essential services in the energy, transport, banking and healthcare sectors, and providers of key digital services like search engines and cloud computing, to take appropriate security measures and report incidents to the national authorities.”
Does someone in your organisation have authority to disconnect your data warehouse? Is it you? What would happen if there an incident going on at your organisation now but you aren’t picking up the phone because you are at an excellent talk on securing your data warehouse???
Three key points
Longest and possibly most expensive stage (ref ukraine, heartbleed)
Use as a feedback loop back to the development/implementation team. Don’t let them design a solution that can’t be recovered – or is too expensive
Build and prepare a plan – and try to test something, even a desktop exercise
VPP
- Lots of data - consumption, control, forecasts, market, commercial
- not "traditional" grid operations - which is value of case study as it challenges many of the usual concepts - forget the air gap
- Real - we are working on these projects today across Europe
Analytics – two main challenges
chain of trust from the source of the data to the analytics system
Protection of the data in the analytics system